<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Stone Security Engineering</provider_name><provider_url>https://stonesecurityengineering.com</provider_url><author_name>admin</author_name><author_url>https://stonesecurityengineering.com/author/admin/</author_url><title>Six Steps to Specifying Blast Products - Stone Security Engineering</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="KrAOJpcODg"&gt;&lt;a href="https://stonesecurityengineering.com/six-steps-to-specifying-blast-products/"&gt;Six Steps to Specifying Blast Products&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://stonesecurityengineering.com/six-steps-to-specifying-blast-products/embed/#?secret=KrAOJpcODg" width="600" height="338" title="&#x201C;Six Steps to Specifying Blast Products&#x201D; &#x2014; Stone Security Engineering" data-secret="KrAOJpcODg" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
&lt;/script&gt;
</html><description>The world of blast protection has been rapidly expanding and there are now numerous products and approaches to provide protection from explosive attack. Where there used to be two solutions, there may now be ten. It is critical that security and design professionals understand the strengths and limitations of the various mitigation measures, and how [&hellip;]</description><thumbnail_url>https://lh4.googleusercontent.com/UHCVkPSbc0K-_9ckuZ_VLhIPVQH4CUSRyYtnS2H03GUiKZmqbq0xwohnJjYAK54TTLwmh7UED_2jyOjqkaqXxSC6hR6SUpoVr4KGI2q5hTspnKuqGSEjormzqE0Y_TlV5oqjLsQdopPsAOhH</thumbnail_url></oembed>
